专业软件设计师网站|培训机构|服务商(加客服微信:cnitpm或QQ:947530340进软件设计师学霸群)

软题库 培训课程
当前位置:信管网 >> 软件设计师 >> 每日一练 >> 文章内容
软件设计师每日一练试题(2022/10/27)
来源:信管网 2022年10月28日 【所有评论 分享到微信

软件设计师当天每日一练试题地址:www.cnitpm.com/exam/ExamDay.aspx?t1=4

往期软件设计师每日一练试题汇总:www.cnitpm.com/class/27/e4_1.html

软件设计师每日一练试题(2022/10/27)在线测试:www.cnitpm.com/exam/ExamDay.aspx?t1=4&day=2022/10/27

点击查看:更多软件设计师习题与指导

软件设计师每日一练试题内容(2022/10/27)

  • 试题1

    采用n位补码(包含一个符号位)表示数据,可以直接表示数值( )。
    A.可以直接表示数值
    B.可以直接表示数值
    C.可以直接表示数值
    D.可以直接表示数值

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/4069326857.html

  • 试题2

    Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an(1)from a friend who asks you to open it. This is what happens with Melissa and several other similar email(2).Upon running ,such worms usually proceed to send themselves out to email addresses from the victim's address book, previous emails, web pages(3).
    As administrators seek to block dangerous email attachments through the recognition of well-known (4),virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to .bat and .cmd plus a whole list of other extensions and will still run and successfully infect target users.
    Frequently ,hackers try to penetrate networks by sending an attachment that looks like a flash movie ,which, while displaying some cute animation ,simultaneously runs commands in the background to steal your passwords and give the(5)access to your network.
    (1)A、attachment
    B、packet
    C、datagram
    D、message
    (2)A、virtual
    B、virus
    C、worms
    D、bacteria
    (3)A、memory
    B、caches
    C、ports
    D、registers
    (4)A、names
    B、cookies
    C、software
    D、extensions
    (5)A、cracker
    B、user
    C、customer
    D、client

    查看答案

    试题参考答案:A、C、B、D、A

    试题解析与讨论:www.cnitpm.com/st/77632673.html

  • 试题3

    某哈希表(散列表)的长度为 N,设散列函数为 H(Key)=Keymodp ,采用 线性探测法解决冲突。以下关于 P 值的叙述中,正确是()
    A.P 的值一般为不大于 n 且最接近 n 的质数
    B.P 的值一般为大于 n 的任意整数
    C.P 的值必须为小于 n 的合数
    D.P 的值必须等于 n

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/2712513957.html

  • 试题4

    The project workbook is not so much a separate document as it is a structure imposed on the documents that the project will be producing anyway.
    All the documents of the project need to be part of this ( ). This includes objectives ,external specifications , interface specifications , technical standards , internal specifications and administrative memoranda(备忘录).
    Technical prose is almost immortal. If one examines the genealogy ( Ff ) of a customer manual for a piece of hardware or software , one can trace not only the ideas , but also many of the very sentences and paragraphs back to the first ( ) proposing the product or explaining the first design. For the technical writer, the paste-pot is as mighty as the pen.
    Since this is so, and since tomorrow's product-quality manuals will grow from today’s memos, it is very important to get the structure of the documentation right. The early design of the project (请作答此空) ensures that the documentation structure itself is crafted, not haphazard. Moreover, the establishment of a structure molds later writing into segments that fit into that structure.
    The second reason for the project workbook is control of the distribution of ( ). The problem is not to restrict information, but to ensure that relevant information gets to all the people who need it.
    The first step is to number all memoranda, so that ordered lists of titles are available and h worker can see if he has what he wants. The organization of the workbook goes well beyond this to establish a tree-structure of memoranda. The ( ) allows distribution lists to be maintained by subtree, if that is desirable.
    A.title
    B.list
    C.workbook
    D.quality

    查看答案

    试题参考答案:C

    试题解析与讨论:www.cnitpm.com/st/407637889.html

  • 试题5

    耦合度描述了( )。
    A、模块内各种元素结合的程度
    B、模块内多个功能之间的接口
    C、模块之间公共数据的数量
    D、模块之间相互关联的程度

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/78292696.html

  • 试题6

    数据库系统中的视图、存储文件和基本表分别对应数据库系统结构中的( )。
    A.模式、内模式和外模式
    B.外模式、模式和内模式
    C.模式、外模式和内模式
    D.外模式、内模式和模式

    查看答案

    试题参考答案:D

    试题解析与讨论:www.cnitpm.com/st/4074111652.html

  • 试题7

    设计模式(1)将抽象部分与其实现部分相分离,使它们都可以独立地变化。下图为该设计模式的类图,其中,(2) 用于定义实现部分的接口。



    (1)A.Bridge(桥接)
    B.Composite(组合)
    C.Facade(外观)
    D.Singleton(单例)
    (2)A.Abstraction
    B.ConcreteImplementorA
    C.ConcreteImplementorB
    D.Implementor

    查看答案

    试题参考答案:A、D

    试题解析与讨论:www.cnitpm.com/st/246414838.html

  • 试题8

    某银行为了使其网上银行系统能够支持信用卡多币种付款功能而进行扩充升级,这需要对数据类型稍微进行一些改变,这一状况需要对网上银行系统进行 ( ) 维护。
    A、正确性
    B、适应性
    C、完善性
    D、预防性

    查看答案

    试题参考答案:B

    试题解析与讨论:www.cnitpm.com/st/81812817.html

  • 试题9

    CDMA 系统中使用的多路复用技术是(1)。我国自行研制的移动通信3G 标准是(2)。
    (2)A、时分多路 
    B、波分多路  
    C、码分多址  
    D、空分多址
    (2)A、TD-SCDMA 
    B、WCDMA  
    C、CDMA2000  
    D、GPRS

    查看答案

    试题参考答案:C、A

    试题解析与讨论:www.cnitpm.com/st/78692709.html

  • 试题10

    ( )设计模式将一个请求封装为一个对象,从而使得可以用不同的请求对客户进行参数化,对请求排队或记录请求日志,以及支持可撤销的操作。
    A.命令(Command)
    B.责任链(Chain of Responsibility)
    C.观察者(Observer)
    D.策略(Strategy)

    查看答案

    试题参考答案:A

    试题解析与讨论:www.cnitpm.com/st/2534213567.html

扫码关注公众号

温馨提示:因考试政策、内容不断变化与调整,信管网网站提供的以上信息仅供参考,如有异议,请以权威部门公布的内容为准!

信管网致力于为广大信管从业人员、爱好者、大学生提供专业、高质量的课程和服务,解决其考试证书、技能提升和就业的需求。

信管网软考课程由信管网依托10年专业软考教研倾力打造,官方教材参编作者和资深讲师坐镇,通过深研历年考试出题规律与考试大纲,深挖核心知识与高频考点,为学员考试保驾护航。面授、直播&录播,多种班型灵活学习,满足不同学员考证需求,降低课程学习难度,使学习效果事半功倍。

相关内容

发表评论  查看完整评论  

推荐文章